1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
11

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi

tive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer.
What should you use for this situation?
Computers and Technology
1 answer:
slava [35]3 years ago
3 0

Answer: VLAN

Explanation: VLAN(Virtual local area network) is the network technology that lets the user to connect in a virtual( fake) environment and displaying as if they are working in the LAN environment.

It is the used for obtaining the scalability and protection of information while communication. It also helps in adapting the change that occurs in the network and  nodes of the server. Thus, VLAN is the network that should be used in the business to keep sensitive data secure and hosts of the network to connect and communicate .

You might be interested in
Hey I don’t have a question I’m just testing something on this app
Dafna1 [17]

Answer:

hahaha

Explanation:

4 0
3 years ago
Read 2 more answers
The address of the last cell of a memory RAM is 3FFFFh.a total capacity of the main memory and 4M bits and the data bus can tran
marysya [2.9K]

Hey there!:

Given the address of the last cell of a memory RAM is 3FFFFh then   :

There are 8 bits in a byte  

1024 bytes in a kilobyte  

 so 8*1024= 8192  

 so 8192 bits in a kb  

 32*8192 = 262144  

there are 262144 bits in 32KB .

a) 32 bit address registers must match 2^32 byte = 4 GB of physical memory.

However, with 32 Bit you can also address more than 4 GB, like Physical Address Extension (PAE) does.

The other way is that you can access 4 GB with less than 32 bit address register.

____________________________________________________

b) Main Memory = 4M × 32Kbits, RAM chips = 32K × 4bit.

For this memory we require 4 × 2 = 8 RAM chips.

Each chip requires 18 address bits (ie. 218 = 256K).

And 1M × 8 bits requires 20 address bits (ie. 220 = 1M )

_____________________________________________________

c) The size of the storage cells is known as the word size for the computer.

In some computers, the word size is one byte while in other computers the word size is two, four, or even eight bytes. In our 4M main memory the size of cell is 4*2^20 bytes.

Each storage cell in main memory has a particular address which the computer can use for storing or retrieving data.  

______________________________________________________

d) The size of MBR is the 4M bits of main memory.

_____________________________________________________

Hope this helps!

6 0
3 years ago
What is self management​
never [62]

Answer:

when you manage or construct something by yourself, taking full reponsiblity, etc

Explanation:

4 0
3 years ago
Read 2 more answers
Which type of address is the ip address 198.162.12.254/24?
Ilya [14]
Multicast Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?

Which type of address is the IP address 198.162.12.254/24?
Unicast
8 0
4 years ago
What does the "zoom tool" do in Photoshop?
siniylev [52]

Answer:

A. All of the above

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Reflexes are basically "hard-wired" into the CNS. Anatomically, the basis of a reflex is an afferent neuron that synapses direct
    10·1 answer
  • According to the article words have the power to change people's behavior. Describe one example of this from the article
    6·1 answer
  • The political spectrum spans from Communism on the extreme left to __________ on the extreme right. /8178757/1f6bdbf3?utm_source
    6·2 answers
  • Bushman and bonacci (2004) found that prejudiced participants were ____ likely to return a lost e-mail that had been addressed t
    5·1 answer
  • Below is the prototype for a function that takes two pointers to integer variables as its parameters. The purpose of the functio
    14·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • If a touch screen chrome is not charging what is wrong with it
    13·2 answers
  • A(n) _____ is a network connection device that can build tables that identify addresses on each network.
    10·1 answer
  • Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!